Prepared by Dr. Samia Chelloug Princess Nora Bint Abdulrahman University College of computer and information sciences Networks.

Slides:



Advertisements
Similar presentations
IPSec.
Advertisements

Advanced Networks and Computer Security Curt Carver & Jeff Humphries © 1999 Texas A&M University.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Cryptography and Network Security Sixth Edition by William Stallings.
Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Prepared by Dr.
Cryptography and Network Security Chapter 1
Chapter 1 This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet.
Lecture 1: Overview modified from slides of Lawrie Brown.
Introduction to network security
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Security (Part 2) School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 13, Thursday 4/5/2007)
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Applied Cryptography for Network Security
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
“Network Security” Introduction. My Introduction Obaid Ullah Owais Khan Obaid Ullah Owais Khan B.E (I.T) – Hamdard University(2003), Karachi B.E (I.T)
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
INTRODUCTION TO NETWORK SECURITY l.Tahani Aljehani.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”.
Introduction (Based on Lecture slides by J. H. Wang)
Cryptography and Network Security
Information Security Principles (ESGD4222)
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Network Security Essentials Chapter 1
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Network Security Essentials Chapter 1 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Computer Security: Principles and Practice
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Another perspective on Network Security Network Security Essentials: Applications and Standards, 4/E William Stallings ISBN-10: ISBN-13:
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
NETWORK SECURITY. TextBook William Stallings, Cryptography and Network Security: Principles and Practice, ? Edition.
ACM 511 Introduction to Computer Networks. Computer Networks.
Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”
Cosc 513Presentation, Fall Network Security Student: Jianping He Student ID: Instructor: ProfessorAnvari Fall 2000.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Prepared by Dr. Samia Chelloug
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Topic 5: Basic Security.
T.A 2013/2014. Wake Up Call! Malware hijacks your , sends death threats. Found in Japan (Oct 2012) Standford University Recent Network Hack May Cost.
Network Security Introduction
CST 312 Pablo Breuer. measures to deter, prevent, detect, and correct security violations that involve the transmission of information.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
CS457 Introduction to Information Security Systems
Information System and Network Security
Data & Network Security
CNET334 - Network Security
Information and Network Security
NET 311 Information Security
Lecture 1: Foundation of Network Security
Prepared by Dr. Samia Chelloug
Computer Security CIS326 Dr Rachel Shipsey.
Introduction to Cryptography
Security Attacks, Mechanisms, and Services
Computer Security CIS326 Dr Rachel Shipsey.
Challenges Of Network Security
Security Attacks Network Security.
Presentation transcript:

Prepared by Dr. Samia Chelloug Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Content 1.Basics of computer and network security. 2.Impact of network security architecture on network security. 3.Basics of network design. 4.Firewalls and virtual private networks. 5.Internet and wireless network security. 6.Impact of operating systems models on network security. 7.How to secure an application?

Textbooks 1.Bahrouz A.Forouzan, ‘Data Commnications and Networking’, Fourth Edition, William Stallings, ‘Cryptography and Network Security: Principles and practice’, Fifth edition, Eric Cole, Ronald L.Kruz, James W.Conley, ‘Network Security Fundamentales’, Wiley 2007.

Basics of computer and network security Computer security: involves implementing measures to secure a single computer (protecting the ressources stored on that computer). Network security: involves protecting all the ressources on a network. We must consider not only the computers on the network but other network devices and data transmitted across the network.

Basics of computer and network security Security attack: any action that comprises the security of information owned by an organization.

Basics of computer and network security Passive attack Active attack Attempts to learn or make use of information from the system but does not affect system ressources. The goal is to obtain information that is being transmitted. Telephone converstaion, electronic message… This type of attack is difficult to detect (it does not involve any alteration in data). Attempts to learn or make use of information from the system but does not affect system ressources. The goal is to obtain information that is being transmitted. Telephone converstaion, electronic message… This type of attack is difficult to detect (it does not involve any alteration in data). Attempts to involve some modification of the data stream or the creation of a false stream. Based on scanning (using a search -google or any traditional method). Attempts to involve some modification of the data stream or the creation of a false stream. Based on scanning (using a search -google or any traditional method).

Why is computer and network security important? 1.Protect company assests (hardware and software). 2.Gain competive advantage: developping and maintaing effective security measures can provide an organization with a competive advantage over its competion. Basics of computer and network security Your computer E-commerce-server Unauthorized access Data Intercept

Why is computer and network security important? 3. Keep your job: to secure one’s position within an organization and to ensure futur career, it is important to put into place measures that protect organizational assests. Basics of computer and network security

Network security: can provide one of the five services: confidentiality, integrity, authentification, nonrepudation. 1.Confidentiality: the transmitted message must make sense to only the intended receiver. To the others, the message must be garbage. When a costumer communicates with her bank, she expects that her communication is totaly confidential. Basics of computer and network security

2. Integrity: the data must arrive to the receiver exactly as they were sent. A request for transferring 100$ should not be changed to a request for 1000$. 3. Authentification: the receiver needs to be sure of the sender’s identity. 4.Nonrepudation : a sender must not be able to deny sending a message that he or she, in fact, did send. Basics of computer and network security

Security trinity: Network security is based on: prevention, detection, and response. Security trinity should be the foundation for all security policies. Basics of computer and network security Security Detection Response Prevention

Basics of computer and network security -Prevention: in developping network security schemes, any organization should emphasize preventive measures over detection and response. It is more efficient and much more cost effective to prevent a security attack than to detect or repond to one. -Detection: once the preventive measures fail, procedures need to be put in place to detect immediatly to detect the araised attack. -Response: we need to develop a plan that identifies the appropriate response to a security atatck (who is responsable to execute some actions, what is the appropriate action ?)

Challenges of computer and network security: 1.Security is not simple as it might first appear to the novice: we need to consider potential attacks. Security mechanisms typically involve more than a paticular algorithm. 2.Having designed various security mechanisms, it is necessary to decide where to use them (physical and logical sense). What points in a network are certain secured mechanisms needed? What layer or layers of our architecture should mechanisms be placed? Basics of computer and network security